Safe-mail is a web based e-mail system which provides all the user functionality of
normal systems plus a whole lot more features to give absolute security, privacy and flexibility.
Each registered Safe-mail user has their own Virtual Secure User Space (VSUS) on the mail server. It contains a user's personal
mailbox (in and out), personal information and personal electronic address book. Hence, communication between users is a function
of messages going from one sector of the mail server to another sector of the same server. Unlike conventional e-mail systems,
users do not need their own permanent computer to view and edit their address books or access their mail boxes. They simply
need to access their VSUS via any Internet browser on any computer.
Because all data held on the mail server is secured with a very strong proprietary encryption mechanism (as will be described below),
a user's VSUS is a
Safe-mail provides an unmatched level of protection against invasion of privacy when compared to any other system.
The authentication function allows you:
Closed-off Groups
Restricted Access to Personal Information
Viewing and Removing Authentications
For a better idea of how to use the Authentication feature, see
example
The Safe-mail web site resides on a mail server and all users communicate through any Internet browser directly to the mail server.
very private and very secure place.
Using SSL (Secure Socket
Layer which is a component of all current browsers) for all data transmissions and strong proprietary
encryption for server security, Safe-mail offers the highest possible protection for all e-mail communications and file attachments.
All e-mail including attachments transmitted to and from the mail server are secured with SSL.
For a detailed explanation of SSL and how it works go to How SSL works.
A second level of security is achieved by Safe-mailTM Authentication function
About Authentication
Creating Bona Fide Identity
You may authenticate another person because you know, absolutely, the
true identity of the person being authenticated. (i.e. you are friends,
colleagues, related etc.) With immediate effect, your name as the authenticator
will appear on all the Safe-mailTM messages
which your authenticated person sends. People receiving messages from that
person bearing your name as an authenticator (and who know you) will immediately
accept that the sender of the message is who they claim to be, even if
they do not actually know the person sending the message. You may authenticate
as many people as you wish. To authenticate another person, click on the
Authentication tab in the top level of the
Safe-mailTM
interface, select the Send Authentication tab and key in their
Safe-mailTM
name in the To: field. Use the Comments box to define the
significance of the authentication; this information will be displayed to
the receiver of the authentication.
The reasons for wanting to create a fenced-off community of people
are numerous. In the business environment, a department may want to confine
the exchange of information to within certain parts of the company, filtering
out the trivial or non relevant. More casual groups of people with a common
interest (hobbies etc.) may want to ensure that their incoming messages
are from people who share the same interest. Whatever the reason, a closed
group is where all the members are authenticated by one person and they
only accept incoming Safe-mailTM from people
who have been authenticated by that person. To control incoming
Safe-mailTM
by authentications, click on the Preferences tab in the top level of
the Safe-mailTM interface and select Mail
Control.
You may wish to restrict the access of your person information to people
who have been authenticated by a certain person whom you trust. To restrict
access to your personal information, click on the User-info tab in the
top level of the Safe-mailTM interface,
go to the bottom of the page and complete the Publish List section.
You may view the list of authentication certificates you have given and the list of authentication certificates you have received.
Click on the Authentication tab
in the top level of the Safe-mailTM interface
and select either Authentications Received or Authentications Given.
While viewing the certificates, you may remove any cerificate you have given
and any certificate you have received at any time by clicking the 'Remove' button at the top of the certificate.
©1999-2008 Safe-mail Limited. All rights reserved.
Safe-mailTM is a Trade Mark of Safe-mail Limited.